zenliant.com
Open in
urlscan Pro
192.185.5.125
Malicious Activity!
Public Scan
Effective URL: http://zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/
Submission: On April 09 via automatic, source phishtank
Summary
This is the only time zenliant.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 184.168.130.208 184.168.130.208 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
15 | 192.185.5.125 192.185.5.125 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
1 | 108.167.172.195 108.167.172.195 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
16 | 2 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-184-168-130-208.ip.secureserver.net
www.go2l.ink |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: ns8028.hostgator.com
zenliant.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
zenliant.com
zenliant.com |
438 KB |
1 |
shopget24.com
shopget24.com |
24 KB |
1 |
go2l.ink
1 redirects
www.go2l.ink |
274 B |
16 | 3 |
Domain | Requested by | |
---|---|---|
15 | zenliant.com |
zenliant.com
|
1 | shopget24.com |
zenliant.com
|
1 | www.go2l.ink | 1 redirects |
16 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/
Frame ID: 7FB5159E17C05A225401BD0C889560C3
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.go2l.ink/1qEu
HTTP 302
http://zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.go2l.ink/1qEu
HTTP 302
http://zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/ Redirect Chain
|
26 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.css
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.css
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationTextField.js
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.js
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
images.png
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gmail.png
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/images/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aol.png
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
off.png
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/images/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
other.png
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/images/ |
194 KB 194 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery_002.js
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hack-run.png
shopget24.com/images/sampledata/ |
24 KB 24 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpryValidationPassword.js
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/images/ |
188 KB 188 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
zenliant.com/PPT/VVS+/5769e2758e028b69fd3d63d15422fb28cd59edfa/files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| sprypassword1 undefined| sprytextfield10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
shopget24.com
www.go2l.ink
zenliant.com
108.167.172.195
184.168.130.208
192.185.5.125
1e456c640c136449a206c7a5574cd162b76363d2e6ba144afa948832279f1a3d
37647ec3b73b82d6c91f739053905743a1686268453c955c4e341e44517e65f2
6903fa3a18aa5c61b38ad74e21a448658c1a6958c26621b01589de6d8cedf907
9b988a69c48ad99be9a734fe162590196d1c839c0a8774864b6e5950ce85a3d0
9ff9144f83ac9b5873a5c5475b30841d1f18f30e592714de1b337dcb7318e005
ad2ba357ee612c6a5bc38ee991481ba8e3c25cdfb64780b868c84266d8d27c77
e6a6b6c54ac547299461cc6463ca39ebc8fb421b41d99baaf40f0e54731cf97a
fbe8559ad3b4307678250a671b8c259adf8ded119c8d133d1b706f0f4879a051